Citrix Discovers 2 Vulnerabilities, Both Exploited in the Wild

These vulnerabilities are the second and third for Citrix but are not expected to be as detrimental as “CitrixBleed.”
Scroll to Top